de-DEen-US
Language
Search
× Search
Saturday, December 21, 2024

Sys-Manage Blog

This page contains Sys-Manage's blog, where we will provide interesting postings about topics such as migrations of file servers, NAS storage solutions, Microsoft IIS, Active Directory on-premise and into the cloud.

Selective Authentication for Computer & Profile Migration

Sys-Manage 0 597 Article rating: 5.0

This article provides a step-by-step guide to configuring a Windows® domain trust with selective authentication using CopyRight2's Computer and Profile Migration feature. Selective authentication is a critical security feature that restricts access to specific resources across domains. The guide explains how to establish a trust relationship, enable selective authentication, and set the necessary permissions to avoid common errors during the migration process. By following these steps, users can ensure secure and efficient cross-domain migration while maintaining control over which users and computers can access resources in the target domain.

Integrate PowerShell to Extend Your Migration Process

Sys-Manage 1 3050 Article rating: 4.3

Learn more about how to use  CopyRight2's PowerShell Integration Add-on to integrate PowerShell Cmdlets into your ActiveScripts defined in your migration job settings (object transformation scripts, job start/end scripts, copy start/end scripts). PowerShell provides access to local and remote management of not only Windows® and many applications running on Windows® such as Microsoft® Exchange but also to other platforms like macOS® and Linux systems.

Migrate Users from Account Forest to Exchange Resource Forest

Sys-Manage 0 4625 Article rating: 4.4
This article explains how to migrate Active-Directory users of a so-called account forest domain to an Exchange resource forest domain including the conversion of linked into regular mailboxes. Running an Exchange installation in a separate forest has the advantage that Exchange schema extensions are kept completely separate from the forest the account domain belongs to. It is also an administrative boundary for example in case Exchange is provided by a hosting company. On the other hand, it adds complexity and additional domain controllers to the environment that have to be taken care of.

Migrate Tectia® SSH for Windows Users and Data

Sys-Manage 0 5909 Article rating: 4.5
This article explains how to use CopyRight2 to migrate Tectia SSH for Windows® including user accounts along with their passwords, their Windows® user profiles, groups, group memberships and data including permissions. Tectia®, originally named SSH Communications Security, was founded by SSH's inventor and Finland native Tatu Ylönen, in response to a password-sniffing attack at his university.

How Share, NTFS Permissions and Inheritance Actually Work

Sys-Manage 2 47752 Article rating: 4.9

This article explains Windows® share and NTFS level permissions including inheritance. The concept of NTFS permission inheritance was introduced a long time ago with the release of Windows® 2000. For whatever reason, it is still one of the less understood topics. We discuss what share and NTFS permissions are and how they work in detail.

RSS
Terms Of UsePrivacy StatementCopyright © Sys-Manage, 1998-2024. All Rights Reserved.
Back To Top